Handwriting detection using CNN, KNN, SVM, and Random Forest algorithms.
☆18Nov 24, 2017Updated 8 years ago
Alternatives and similar repositories for Optical-Character-Recognition-using-CNN-KNN-SVM-RF
Users that are interested in Optical-Character-Recognition-using-CNN-KNN-SVM-RF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stacked five machine learning models: SVM, DT, RF, NB, and KNN, into one “smart detection stacked model” using a stacking classifier to …☆11Aug 9, 2022Updated 3 years ago
- Application Layer DDoS attack detection using fast entropy computation method☆13May 18, 2024Updated last year
- demonstrate pso-svm in python☆17Aug 14, 2019Updated 6 years ago
- cnn_1D for kdd99☆21Nov 7, 2018Updated 7 years ago
- Detecting and mitigating DDoS attacks using Software Defined Networks. This was created as a part of Research Based Learning Project for …☆22May 17, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- using machine-learning to detecte instruction☆29Oct 21, 2019Updated 6 years ago
- DDoS Project with Detection☆33Mar 16, 2015Updated 11 years ago
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 5 months ago
- ☆41Aug 23, 2022Updated 3 years ago
- Paribasa or you can call it as Javanese quotes☆10Jan 6, 2023Updated 3 years ago
- The Codec 2 speech codec, compiled to WASM using Emscripten.☆13Apr 27, 2023Updated 2 years ago
- FPE - Format Preserving Encryption with FF3 in C☆14Apr 3, 2026Updated 2 weeks ago
- Repository to discuss and track progress of "Future of Build Toolchain" Strategic Initiative☆11Feb 2, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A high-performance, thread-safe channel implementation in C++17, inspired by Go's channels☆16Jul 28, 2024Updated last year
- PSO algorithm for multi-parameters optimizaiton☆66Dec 2, 2018Updated 7 years ago
- The wrapper over asmcgocall to call C functions synchronously, without extra os threads and overhead on it. Probably won't work since 1.1…☆15Feb 20, 2020Updated 6 years ago
- 🌊 A React UI library☆13Feb 2, 2022Updated 4 years ago
- Python based DDoS attack detection and mitigation system built over Ryu controllers and Mininet SDN,☆55Apr 21, 2016Updated 9 years ago
- Intrusion Detection Based on Convolutional Neural Network with kdd99 data set☆57May 15, 2019Updated 6 years ago
- AEAD encryption using Trusted Platform Module (TPM)☆12Jan 5, 2026Updated 3 months ago
- Loadable Module for Keystone Enclave☆19Sep 24, 2022Updated 3 years ago
- SQL Server Always Encrypted Key Store Generic Provider for Key Store Interopearibility between Windows and Linux☆11Oct 24, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- OCaml implementation of Wake-On-LAN (WOL)☆16Apr 30, 2024Updated last year
- ☆13Apr 22, 2024Updated last year
- Solutions to math olympiad problems in Isabelle/HOL☆11May 29, 2021Updated 4 years ago
- GO implementation of FF1 and FF3 from NIST Special Publication 800-38G☆14Jan 4, 2018Updated 8 years ago
- A TEE programming framework based on trusted functions.☆14Mar 23, 2021Updated 5 years ago
- Examples for Algebraic Effects talk at OCaml'15 Workshop☆15May 31, 2016Updated 9 years ago
- Container building stuff☆16Mar 3, 2026Updated last month
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- Sample of standalone portable C to verify Ed25519 public-key signature☆20Sep 24, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Arduino Library to use Cbor encoder and several examples to use☆10Oct 23, 2015Updated 10 years ago
- Infinite Cloud bot source code☆14May 10, 2025Updated 11 months ago
- CloudedBats.org - main repository☆11Mar 19, 2022Updated 4 years ago
- Bottom-up memory-safety for assembly language using symbolic execution☆18Feb 19, 2026Updated 2 months ago
- Mock implementation of the Java Card API 3.0.4 in order to test Java Card applet code without a card or simulator.☆15May 6, 2019Updated 6 years ago
- Dockerized FPGA toolchains containing openxc7, f4pga, vivado and more☆15Apr 3, 2025Updated last year
- PRINCESS source code☆11Oct 15, 2016Updated 9 years ago